Ex Parte Carpenter et al - Page 4

            Appeal 2007-0645                                                                               
            Application 10/242,898                                                                         

        1   2 through 5, 13 through 17, and 19 through 24.  In accordance with 37 C.F.R.                   
        2   § 41.37(c)(1)(vii) we group all of the rejected claims together, and we will treat the         
        3   claims as one group and select claim 1 as representative of the group.                         
        4         The Appellants’ contention presents us with the issue of whether Sitka                   
        5   teaches the claim limitation of “a document vault database coupled to the web                  
        6   server, the document vault database storing information regarding whether a user is            
        7   authorized to access a document file.”                                                         
        8                                                                                                  
        9                                    FINDINGS OF FACT                                              
       10         Sitka teaches a system for storing data on a server. (col. 28, ll. 3-12).  The           
       11   server can be accessed through the internet via a web server. (See for example                 
       12   figure 8). The system makes use of a Directed Storage Management (DSM) system                  
       13   to access data in a database and to provide the data to the user over the web. (col.           
       14   8, ll. 14-20 and col. 29, l. 64 through col. 30, l. 30)  The DSM performs security             
       15   features such as verifying passwords and determines which store and files the user             
       16   has access to.  (col. 12, ll. 39-58).  Sitka states in column 13, ll. 45-50:                   
       17                When a user connects to DSM system 10, his Logon and password are                 
       18         verified, and his ActiveGroup ID is set to the User’s Default GroupID.  The              
       19         Stores that the user can access and the permissions for those Stores are                 
       20         obtained once from the GroupMember and StoreAnalysis tables and cached                   
       21         by DSM system 10 for the open connections.                                               
       22                                                                                                  
       23   We find the GroupMember and StoreAnalysis tables to be a form of a database that               
       24   contains information regarding user authorization to access files.  Further, Sitka             
       25   teaches that algorithms are employed to determine permissions for file access.                 
       26   (col. 14, ll. 1-9).                                                                            
       27                                                                                                  
       28                                                                                                  

                                                     4                                                     


Page:  Previous  1  2  3  4  5  6  Next

Last modified: September 9, 2013